Dolph Mathews discovered that when roles are granted and revoked tousers in Keystone, pre-existing tokens were not updated or invalidatedto take the new roles into account. An attacker could use this tocontinue to access resources that have been revoked.